10 Differences Between Digital Transformation Leaders and Laggards

Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind.

The post 10 Differences Between Digital Transformation Leaders and Laggards appeared first on Security Intelligence.

Continue reading 10 Differences Between Digital Transformation Leaders and Laggards

The Future of Cybercrime: Where Are We Headed?

Reading Time: 3 minutes By 2024, the collective cost of data breaches will reach $5 trillion, according to a study by Juniper Research. This is just one indication of how the future of cybercrime will impact us.

The post The Future of Cybercrime: Where Are We Headed? appeared first on Security Intelligence.

Continue reading The Future of Cybercrime: Where Are We Headed?

How Implementing Cloud Identity Can Improve Security and Data Privacy

Reading Time: 3 minutes Digital transformation is changing everything in the business world, including customer relations. Cloud identity can make those transactions more secure and private.

The post How Implementing Cloud Identity Can Improve Security and Data Privacy appeared first on Security Intelligence.

Continue reading How Implementing Cloud Identity Can Improve Security and Data Privacy

The Wild West Era Has Ended — What’s Next for Data Privacy?

People often think of the cybersecurity industry as the Wild West, but data privacy regulations have been influencing the way companies respond to a data breach for well over a decade.

The post The Wild West Era Has Ended — What’s Next for Data Privacy? appeared first on Security Intelligence.

Continue reading The Wild West Era Has Ended — What’s Next for Data Privacy?

Massachusetts Amends Data Breach Law — What to Know for Your Incident Response Strategy

This update can be seen as part of a wider trend in data privacy regulations where guidelines on breach reporting and incident response documentation are becoming more specific.

The post Massachusetts Amends Data Breach Law — What to Know for Your Incident Response Strategy appeared first on Security Intelligence.

Continue reading Massachusetts Amends Data Breach Law — What to Know for Your Incident Response Strategy

Notable GDPR Enforcement Actions in the First Year and Key Takeaways

In the year since the General Data Protection Regulation (“GDPR”) went into effect on May 25, 2018, companies worldwide have been adapting to the new privacy rules—and EU regulators have also been busy adjusting to the new … Continue reading Notable GDPR Enforcement Actions in the First Year and Key Takeaways

Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.

The post Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners appeared first on Security Intelligence.

Continue reading Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.

The post Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness appeared first on Security Intelligence.

Continue reading Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness

Breaking Down the Incident Notification Requirements in the EU’s NIS Directive

Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.

The post Breaking Down the Incident Notification Requirements in the EU’s NIS Directive appeared first on Security Intelligence.

Continue reading Breaking Down the Incident Notification Requirements in the EU’s NIS Directive

Are You Really Covered by Your Cyber Insurance?

Statistically, you’re probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.

The post Are You Really Covered by Your Cyber Insurance? appeared first on Security Intelligence.

Continue reading Are You Really Covered by Your Cyber Insurance?